WO2000018109A1 - Procede relatif a la confirmation de l'integrite d'une image transmise avec perte - Google Patents
Procede relatif a la confirmation de l'integrite d'une image transmise avec perte Download PDFInfo
- Publication number
- WO2000018109A1 WO2000018109A1 PCT/EP1999/007024 EP9907024W WO0018109A1 WO 2000018109 A1 WO2000018109 A1 WO 2000018109A1 EP 9907024 W EP9907024 W EP 9907024W WO 0018109 A1 WO0018109 A1 WO 0018109A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- cells
- image
- fingeφrint
- random numbers
- sequence
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N1/00—Scanning, transmission or reproduction of documents or the like, e.g. facsimile transmission; Details thereof
- H04N1/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N1/32101—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N1/32128—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title attached to the image data, e.g. file header, transmitted message header, information on the same page or in the same computer file as the image
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3225—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document
- H04N2201/3233—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title of data relating to an image, a page or a document of authentication information, e.g. digital signature, watermark
- H04N2201/3236—Details of authentication information generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N2201/00—Indexing scheme relating to scanning, transmission or reproduction of documents or the like, and to details thereof
- H04N2201/32—Circuits or arrangements for control or supervision between transmitter and receiver or between image input and image output device, e.g. between a still-image camera and its memory or between a still-image camera and a printer device
- H04N2201/3201—Display, printing, storage or transmission of additional information, e.g. ID code, date and time or title
- H04N2201/3278—Transmission
Definitions
- a fingerprint or "hash” is taken of the digital image. Hashing algorithms (i.e. one-way functions) are well known and easy to calculate but very difficult to mathematically invert.
- the fingerprint is typically encrypted with an encryption key to prove or authenticate the creator of the signature.
- the encryption itself is a standard public/private key cryptology with the source station utilizing a private key.
- the resulting signature can be decrypted by a receiving station with the source's public key.
- the hash-key combination along with the original image, is then sent to the receiving station which uses the public key of the presumed transmitter in decrypting the encrypted hash.
- the method should include a fingerprint which is simple to compute from the image but difficult to create an image that has a given fingerprint.
- the fingerprint method also should have the characteristic that it would be difficult to generate two images that have the same fingerprint.
- the fingerprint method should be operable when losses are experienced through transmission of the digitized signal.
- One aspect of the invention is a method for confirming the integrity of a transmitted image including the steps of dividing the image into a first plurality of cells having a first sequence, generating a random seed and generating a first plurality of pseudo random numbers based upon said random seed.
- the method further includes the steps of creating the image into a second plurality of cells based upon the first plurality of pseudo random numbers and the first plurality of cells and generating a second plurality of pseudo random numbers, the second plurality of pseudo random numbers forming a second sequence.
- the method also includes the steps of comparing cells corresponding to the first sequence with cells corresponding to the second sequence, in forming a first finge ⁇ rint, and transmitting the finge ⁇ rint, the image, and the random seed to a receiver.
- the method still further includes the steps of producing a second finge ⁇ rint, by the receiver, using the image and the random seed that was received, and comparing the first and second finge ⁇ rints.
- This method makes it difficult for a third party to manipulate an image without changing the finge ⁇ rint of that image.
- the finge ⁇ rint itself is easy to create if one knows the seed. But, this seed will be unknown by a third party. Even though the image will be sent with losses, the finge ⁇ rint will not change and so it still can be used to monitor the integrity of the image.
- Another aspect of the present invention is a method for creating a finge ⁇ rint of an image including the steps of dividing the image into a first plurality of cells having a first sequence, generating a random seed, generating a first plurality of pseudo random numbers based upon the random seed, and dividing the image into a second plurality of cells based upon the first plurality of pseudo random numbers and the first plurality of cells.
- the method also includes the steps of generating a second plurality of pseudo random numbers, the second plurality of pseudo random numbers forming a second sequence, and comparing cells corresponding to the first sequence with cells corresponding to the second sequence, in forming the finge ⁇ rint.
- This finge ⁇ rint has the same benefits as the finge ⁇ rint stated above.
- a computer readable storage medium has encoded data for dividing an image into a first plurality of cells having a first sequence, generating a random seed, and generating a first plurality of pseudo random numbers based upon the random seed.
- the medium further has data for creating the image into a second plurality of cells based upon the first plurality of pseudo random numbers and the first plurality of cells, generating a second plurality of pseudo random numbers, the second plurality of pseudo random numbers forming a second sequence, and comparing cells corresponding to the first sequence with cells corresponding to the second sequence, in forming a finge ⁇ rint.
- Fig. 1 is a diagram showing the division and ordering of cells of an image to be transmitted according to the invention
- Fig. 2 is a diagram showing newly created cells in accordance with the invention
- Fig. 3 is a diagram of a representative finge ⁇ rint in accordance with the invention.
- Fig. 4 is a flow chart of a method for generation of a signal to be transmitted representing, in part, the image and finge ⁇ rint of Fig. 3;
- Fig. 5 is a flow chart of a method for receiving a transmitted image and finge ⁇ rint of Fig. 3 and for confirming the integrity of that image.
- a n x n grid 100 is applied to a source digital image
- n 2 cells under step 200.
- the value of n depends upon the processing power and probability of accuracy desired.
- the n 2 cells are numbered (Cl, C2, C3. . .Cn 2 ) in accordance with any suitable numbering system desired.
- a random seed "r" is generated. The best way to make this random seed is from a source in nature. For example, electrical noise, radioactive decay, or cosmic rays from the sun. Anything unpredictable that can not be altered easily would form an optimal source.
- n 2 pseudo-random numbers are generated.
- each cell (Cl, C2, C3. . .Cn 2 ) is then manipulated (i.e. displaced and scaled) as a result of its respective prn.
- each cell could be displaced from its origin by the prn and then the width and height changed by the same amount (or by a different amounts generated by multiple prns) as the displacement. If displacement causes a cell to go beyond the original image's boundaries, the cell wraps around to the other side as shown in Fig. 2. As is evident, many cells now overlap. The size and location of these new cells (Cl', C2', C3'. . .Cn ') is unknown to a third party.
- Prior art finge ⁇ rints produced an evaluation metric for each cell thereby creating a corresponding value. Many techniques could be used to find this metric.
- the measure could be the amount of a particular color in each cell, a sum of the values of the pixels, or a discrete cosine transform ("DCT").
- DCT discrete cosine transform
- a third party could easily create a different image that would have the same finge ⁇ rint. If green were the variable, for example, a third party would merely have to produce cells which have the same amount of green in them. However, if a third party attempted to recreate an image with the finge ⁇ rint of the present invention, he would interfere with multiple overlapping cells.
- an evaluation metric is taken for each resulting area of the image.
- the actual measure used is not important and any of the prior art techniques could be implemented. Experimentation has found that if a DCT is used only the DC value is necessary; the AC values do not significantly contribute to the calculation.
- An assortment of techniques could be available and chosen by a user or randomly chosen using the pseudo-random numbers described above. This assortment of techniques could also be combined together to form one large signature. The goal is to make a signature so that it would be difficult for a third party to create a different image with the same signature.
- a finge ⁇ rint is created by comparing the relationship between the pairs to a threshold. If the difference between a pair is above the threshold, a "1" is entered into the finge ⁇ rint. Otherwise, a "0" is entered. Each pair thus produces one bit of a finge ⁇ rint that is n 2 bits long.
- An example of a finge ⁇ rint is shown in Fig. 3. The finge ⁇ rint could be stored on any storage medium or can be transmitted immediately.
- both the finge ⁇ rint and the image are sent.
- the image is sent in the same way as it would have been.
- digital data may be sent during the vertical blanking interval (VBI).
- VBI vertical blanking interval
- pixels are illuminated horizontally, row by row.
- the last pixel is energized, a finite period of time is required to traverse back to the beginning of the screen. During this time, called the VBI, digital data can be received.
- VBI vertical blanking interval
- the image and finge ⁇ rint are decrypted using A's public key.
- the result will be nonsensical if any other source but A sent the message. If the wrong public key is used (for example a third station C), the result will also not make sense.
- the receiver now has the signature and E(r) and uses its own private key to obtain r.
- Receiver B performs the same steps on the image it received as A performed previously. Those steps include: dividing the image into an n-by-n grid, generating pseudo- numbers, etc. This will also produce a finge ⁇ rint of the image received.
- the receiving station compares this generated finge ⁇ rint with the finge ⁇ rint received. These two finge ⁇ rints should be the same. The comparison could be in real time or the finge ⁇ rints could be stored and compared later. Even though there is loss in the transmission, that loss should not affect the finge ⁇ rint so much that it will significantly change.
- n the number of cells created, n, could be increased or decreased depending upon the security desired by a user.
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Collating Specific Patterns (AREA)
- Storage Device Security (AREA)
- Facsimile Transmission Control (AREA)
- Editing Of Facsimile Originals (AREA)
- Facsimile Image Signal Circuits (AREA)
Abstract
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020007005617A KR100699703B1 (ko) | 1998-09-23 | 1999-09-21 | 손실을 가지고 전송된 이미지의 무결성을 확인하는 방법 |
EP99950535A EP1046277A1 (fr) | 1998-09-23 | 1999-09-21 | Procede relatif a la confirmation de l'integrite d'une image transmise avec perte |
JP2000571645A JP4037614B2 (ja) | 1998-09-23 | 1999-09-21 | 損失を伴い伝送される画像の保全性確認方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/159,288 US6266429B1 (en) | 1998-09-23 | 1998-09-23 | Method for confirming the integrity of an image transmitted with a loss |
US09/159,288 | 1998-09-23 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2000018109A1 true WO2000018109A1 (fr) | 2000-03-30 |
Family
ID=22571911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/EP1999/007024 WO2000018109A1 (fr) | 1998-09-23 | 1999-09-21 | Procede relatif a la confirmation de l'integrite d'une image transmise avec perte |
Country Status (6)
Country | Link |
---|---|
US (1) | US6266429B1 (fr) |
EP (1) | EP1046277A1 (fr) |
JP (1) | JP4037614B2 (fr) |
KR (1) | KR100699703B1 (fr) |
CN (1) | CN1156145C (fr) |
WO (1) | WO2000018109A1 (fr) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001030064A1 (fr) * | 1999-10-15 | 2001-04-26 | Koninklijke Philips Electronics N.V. | Systeme d'authentification d'image ou de video |
WO2005091642A1 (fr) * | 2004-03-19 | 2005-09-29 | Koninklijke Philips Electronics N.V. | Integration et extraction d'un germe en liaison avec un signal de television pour production de bruit pseudo-aleatoire |
WO2006057994A2 (fr) * | 2004-11-24 | 2006-06-01 | Thomson Licensing | Technique de simulation de grain d'emulsion pour dispositifs de reproduction de medias |
EP2139220A3 (fr) * | 2008-06-27 | 2010-07-21 | Canon Kabushiki Kaisha | Appareil et procédé de traitement d'informations |
US8150206B2 (en) | 2004-03-30 | 2012-04-03 | Thomson Licensing | Method and apparatus for representing image granularity by one or more parameters |
US8238613B2 (en) | 2003-10-14 | 2012-08-07 | Thomson Licensing | Technique for bit-accurate film grain simulation |
US9098916B2 (en) | 2004-11-17 | 2015-08-04 | Thomson Licensing | Bit-accurate film grain simulation method based on pre-computed transformed coefficients |
US9177364B2 (en) | 2004-11-16 | 2015-11-03 | Thomson Licensing | Film grain simulation method based on pre-computed transform coefficients |
US10237258B2 (en) | 2016-11-30 | 2019-03-19 | International Business Machines Corporation | Single key authentication method |
US10599828B2 (en) | 2016-11-30 | 2020-03-24 | International Business Machines Corporation | Single key authentication method |
US10715834B2 (en) | 2007-05-10 | 2020-07-14 | Interdigital Vc Holdings, Inc. | Film grain simulation based on pre-computed transform coefficients |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8326584B1 (en) | 1999-09-14 | 2012-12-04 | Gracenote, Inc. | Music searching methods based on human perception |
ATE445190T1 (de) | 2000-08-23 | 2009-10-15 | Gracenote Inc | Verfahren zur verbesserten wiedergabe von informationen, client-system und server-system |
KR100353731B1 (ko) * | 2000-11-01 | 2002-09-28 | (주)니트 젠 | 일회성 지문템플릿을 이용한 사용자 인증시스템 및 방법 |
US6842743B2 (en) * | 2000-12-01 | 2005-01-11 | Matsushita Electric Industrial Co., Ltd. | Transparent secure electronic credit card transaction protocol with content-based authentication |
ATE405101T1 (de) | 2001-02-12 | 2008-08-15 | Gracenote Inc | Verfahren zum erzeugen einer identifikations hash vom inhalt einer multimedia datei |
US7269338B2 (en) | 2001-12-11 | 2007-09-11 | Koninklijke Philips Electronics N.V. | Apparatus and method for synchronizing presentation from bit streams based on their content |
US7197143B2 (en) * | 2002-01-18 | 2007-03-27 | The Johns Hopkins University | Digital video authenticator |
KR20040086350A (ko) | 2002-02-05 | 2004-10-08 | 코닌클리케 필립스 일렉트로닉스 엔.브이. | 핑거프린트의 효율적 저장 |
US7167574B2 (en) * | 2002-03-14 | 2007-01-23 | Seiko Epson Corporation | Method and apparatus for content-based image copy detection |
US7110338B2 (en) * | 2002-08-06 | 2006-09-19 | Matsushita Electric Industrial Co., Ltd. | Apparatus and method for fingerprinting digital media |
US7240200B2 (en) * | 2002-09-26 | 2007-07-03 | International Business Machines Corporation | System and method for guaranteeing software integrity via combined hardware and software authentication |
EP1550297B1 (fr) * | 2002-09-30 | 2009-03-18 | Gracenote, Inc. | Extraction de condenses |
CN1711531A (zh) * | 2002-11-12 | 2005-12-21 | 皇家飞利浦电子股份有限公司 | 采指纹多媒体内容 |
US7532804B2 (en) * | 2003-06-23 | 2009-05-12 | Seiko Epson Corporation | Method and apparatus for video copy detection |
JP4282520B2 (ja) * | 2004-03-24 | 2009-06-24 | シャープ株式会社 | 信号処理方法、信号出力装置、信号処理装置、画像処理装置、及び画像形成装置 |
US20080092031A1 (en) * | 2004-07-30 | 2008-04-17 | Steven John Simske | Rich media printer |
US7486827B2 (en) * | 2005-01-21 | 2009-02-03 | Seiko Epson Corporation | Efficient and robust algorithm for video sequence matching |
US20070106405A1 (en) * | 2005-08-19 | 2007-05-10 | Gracenote, Inc. | Method and system to provide reference data for identification of digital content |
ATE404914T1 (de) * | 2006-02-15 | 2008-08-15 | Jaycrypto Ltd | Verfahren und vorrichtung zum erzeugen von initialwerten für einen zufallszahlengenerator |
JP2008022373A (ja) * | 2006-07-13 | 2008-01-31 | Canon Inc | 改竄検知情報生成装置、撮像装置、改竄検知情報生成方法、プログラムおよび記憶媒体 |
US20080274687A1 (en) * | 2007-05-02 | 2008-11-06 | Roberts Dale T | Dynamic mixed media package |
US20090196425A1 (en) * | 2008-02-06 | 2009-08-06 | Dean Boland | Method for Authenticating Electronically Stored Information |
US9530072B2 (en) * | 2013-03-15 | 2016-12-27 | Dropbox, Inc. | Duplicate/near duplicate detection and image registration |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5189700A (en) * | 1989-07-05 | 1993-02-23 | Blandford Robert R | Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents |
WO1995020291A1 (fr) * | 1994-01-19 | 1995-07-27 | Highwater Fbi Limited | Procede et dispositif servant a manipuler des donnees numeriques |
US5499294A (en) * | 1993-11-24 | 1996-03-12 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Digital camera with apparatus for authentication of images produced from an image file |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2406359A1 (fr) * | 1977-10-11 | 1979-05-11 | Thomson Csf | Procede et dispositif de traitement d'image pour systeme de visualisation et systeme de visualisation comprenant un tel dispositif |
US5153918A (en) * | 1990-11-19 | 1992-10-06 | Vorec Corporation | Security system for data communications |
US5144667A (en) * | 1990-12-20 | 1992-09-01 | Delco Electronics Corporation | Method of secure remote access |
US5583950A (en) * | 1992-09-16 | 1996-12-10 | Mikos, Ltd. | Method and apparatus for flash correlation |
JP2518503B2 (ja) * | 1993-03-08 | 1996-07-24 | 日本電気株式会社 | 画面切り替え検出方法 |
US5768426A (en) * | 1993-11-18 | 1998-06-16 | Digimarc Corporation | Graphics processing system employing embedded code signals |
US5832119C1 (en) * | 1993-11-18 | 2002-03-05 | Digimarc Corp | Methods for controlling systems using control signals embedded in empirical data |
NZ336413A (en) * | 1993-12-01 | 2000-01-28 | Rpk Nz Ltd | Method of generating random numbers by manipulating electronic pointer with coordinates at points corresponding to time instants being used for selection of points subset and computation of number function |
US5465353A (en) * | 1994-04-01 | 1995-11-07 | Ricoh Company, Ltd. | Image matching and retrieval by multi-access redundant hashing |
US5987634A (en) * | 1994-11-17 | 1999-11-16 | Cirrus Logic, Inc. | Channel quality circuit in a sampled amplitude read channel |
EP2110732A3 (fr) * | 1995-02-13 | 2009-12-09 | Intertrust Technologies Corporation | Systèmes et procédés de gestion de transactions sécurisées et de protection des droits électroniques |
JP3541522B2 (ja) * | 1995-10-09 | 2004-07-14 | 松下電器産業株式会社 | 機器間通信保護システムおよび機器 |
US5859920A (en) * | 1995-11-30 | 1999-01-12 | Eastman Kodak Company | Method for embedding digital information in an image |
GB9601924D0 (en) * | 1996-01-31 | 1996-04-03 | Certicom Corp | Transaction verification protocol for smart cards |
US5857025A (en) * | 1996-09-09 | 1999-01-05 | Intelligent Security Systems, Inc. | Electronic encryption device and method |
JP3526524B2 (ja) * | 1996-10-31 | 2004-05-17 | 松下電器産業株式会社 | 一方向データ変換装置及び機器認証システム |
US5960081A (en) * | 1997-06-05 | 1999-09-28 | Cray Research, Inc. | Embedding a digital signature in a video sequence |
-
1998
- 1998-09-23 US US09/159,288 patent/US6266429B1/en not_active Expired - Fee Related
-
1999
- 1999-09-21 EP EP99950535A patent/EP1046277A1/fr not_active Withdrawn
- 1999-09-21 WO PCT/EP1999/007024 patent/WO2000018109A1/fr active IP Right Grant
- 1999-09-21 JP JP2000571645A patent/JP4037614B2/ja not_active Expired - Fee Related
- 1999-09-21 CN CNB998023434A patent/CN1156145C/zh not_active Expired - Fee Related
- 1999-09-21 KR KR1020007005617A patent/KR100699703B1/ko not_active IP Right Cessation
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5189700A (en) * | 1989-07-05 | 1993-02-23 | Blandford Robert R | Devices to (1) supply authenticated time and (2) time stamp and authenticate digital documents |
US5499294A (en) * | 1993-11-24 | 1996-03-12 | The United States Of America As Represented By The Administrator Of The National Aeronautics And Space Administration | Digital camera with apparatus for authentication of images produced from an image file |
WO1995020291A1 (fr) * | 1994-01-19 | 1995-07-27 | Highwater Fbi Limited | Procede et dispositif servant a manipuler des donnees numeriques |
Non-Patent Citations (2)
Title |
---|
DAVERN P ET AL: "FRACTAL BASED IMAGE STEGANOGRAPHY", INFORMATION HIDING. INTERNATIONAL WORKSHOP PROCEEDINGS,XX,XX, 30 May 1996 (1996-05-30), pages 279 - 294, XP002048612 * |
SZEPANSKI W: "A SIGNAL THEORETIC METHOD FOR CREATING FORGERY-PROOF DOCUMENTS FOR AUTOMATIC VERIFICATION", PROCEEDINGS OF THE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY: CRIME COUNTERMEASURES,US,NEW YORK, IEEE, vol. -, 1979, pages 101 - 109, XP002007950 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001030064A1 (fr) * | 1999-10-15 | 2001-04-26 | Koninklijke Philips Electronics N.V. | Systeme d'authentification d'image ou de video |
US8238613B2 (en) | 2003-10-14 | 2012-08-07 | Thomson Licensing | Technique for bit-accurate film grain simulation |
WO2005091642A1 (fr) * | 2004-03-19 | 2005-09-29 | Koninklijke Philips Electronics N.V. | Integration et extraction d'un germe en liaison avec un signal de television pour production de bruit pseudo-aleatoire |
US8150206B2 (en) | 2004-03-30 | 2012-04-03 | Thomson Licensing | Method and apparatus for representing image granularity by one or more parameters |
US9177364B2 (en) | 2004-11-16 | 2015-11-03 | Thomson Licensing | Film grain simulation method based on pre-computed transform coefficients |
US9098916B2 (en) | 2004-11-17 | 2015-08-04 | Thomson Licensing | Bit-accurate film grain simulation method based on pre-computed transformed coefficients |
US8023567B2 (en) | 2004-11-24 | 2011-09-20 | Thomson Licensing | Film grain simulation technique for use in media playback devices |
AU2005309719B2 (en) * | 2004-11-24 | 2010-07-01 | Interdigital Vc Holdings, Inc. | Film grain simulation technique for use in media playback devices |
WO2006057994A3 (fr) * | 2004-11-24 | 2006-08-24 | Thomson Licensing | Technique de simulation de grain d'emulsion pour dispositifs de reproduction de medias |
WO2006057994A2 (fr) * | 2004-11-24 | 2006-06-01 | Thomson Licensing | Technique de simulation de grain d'emulsion pour dispositifs de reproduction de medias |
US10715834B2 (en) | 2007-05-10 | 2020-07-14 | Interdigital Vc Holdings, Inc. | Film grain simulation based on pre-computed transform coefficients |
EP2139220A3 (fr) * | 2008-06-27 | 2010-07-21 | Canon Kabushiki Kaisha | Appareil et procédé de traitement d'informations |
US8396288B2 (en) | 2008-06-27 | 2013-03-12 | Canon Kabushiki Kaisha | Information processing apparatus and information processing method for image verification |
US10237258B2 (en) | 2016-11-30 | 2019-03-19 | International Business Machines Corporation | Single key authentication method |
US10599828B2 (en) | 2016-11-30 | 2020-03-24 | International Business Machines Corporation | Single key authentication method |
Also Published As
Publication number | Publication date |
---|---|
CN1288633A (zh) | 2001-03-21 |
US6266429B1 (en) | 2001-07-24 |
JP4037614B2 (ja) | 2008-01-23 |
EP1046277A1 (fr) | 2000-10-25 |
KR20010015837A (ko) | 2001-02-26 |
KR100699703B1 (ko) | 2007-03-27 |
JP2002525983A (ja) | 2002-08-13 |
CN1156145C (zh) | 2004-06-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6266429B1 (en) | Method for confirming the integrity of an image transmitted with a loss | |
Fridrich | Security of fragile authentication watermarks with localization | |
Fei et al. | Analysis and design of secure watermark-based authentication systems | |
Liu et al. | An image fragile watermark scheme based on chaotic image pattern and pixel-pairs | |
US6834344B1 (en) | Semi-fragile watermarks | |
Holliman et al. | Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes | |
Fridrich et al. | Further attacks on Yeung-Mintzer fragile watermarking scheme | |
EP0953938B1 (fr) | Méthode et appareil pour filigrane digital d'images | |
Lou et al. | A steganographic scheme for secure communications based on the chaos and Euler theorem | |
KR100878579B1 (ko) | 워터마킹 방법, 워터마크 확인 방법, 워터마킹 장치 및워터마크 확인 장치 | |
Qiao et al. | Watermarking methods for MPEG encoded video: Towards resolving rightful ownership | |
AU2005255946B2 (en) | Systems and methods for digital content security | |
Li et al. | Image authentication and integrity verification via content-based watermarks and a public key cryptosystem | |
Li et al. | Oblivious fragile watermarking scheme for image authentication | |
Ernawan et al. | Self-recovery in fragile image watermarking using integer wavelet transform | |
US7627761B2 (en) | System for authentication of JPEG image data | |
Zhao | Dual domain semi-fragile watermarking for image authentication | |
Lou et al. | Digital signature-based image authentication | |
Lamy et al. | Content-Based Watermarking for Image Authentication | |
KR100685485B1 (ko) | 비대칭 워터마킹 시스템 및 방법 | |
Memon et al. | Authentication techniques for multimedia content | |
Chaudhari | Secure dissemination and protection of raster data using merkle hash tree based cryptowatermarking | |
Ting et al. | A provable watermark-based copyright protection scheme | |
Fei et al. | Achieving computational and unconditional security in authentication watermarking: analysis, insights, and algorithms | |
Chen et al. | A wavelet-based public key image authentication watermarking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 99802343.4 Country of ref document: CN |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): CN JP KR |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1999950535 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 1020007005617 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1999950535 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 1020007005617 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 1020007005617 Country of ref document: KR |